Toggle navigation
Otsi
Publikatsioonid
Profiilid
Registrid
Abi ja info
Switch to English
Intranet
Publikatsioonid
Profiilid
Registrid
Abi ja info
English
Intranet
Andmebaasid
Publikatsioonid
Otsing
Valitud kirjed
0
küberkaitse (märksõna)
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Kõikidelt väljadelt
Autori otsing
Märksõna otsing
Pealkirja otsing
algab
sisaldab
täpne vaste
—
Lisa tingimus
Liitotsing
Tühista
teaviku laadid
raamat
artikkel ajakirjas
artikkel ajalehes
artikkel kogumikus
dissertatsioon
Open Access
Teaduspublikatsioon
aasta
Kirjeid leitud
61
Vaata veel..
(2/12)
Ekspordi
ekspordi kõik päringu tulemused
(61)
Salvesta TXT fail
Salvesta PDF fail
prindi
Märgitud kirjetega toimetamiseks ava
valitud kirjed
kuva
Bibliokirje
Lühikirje
reasta
autor kasvavalt
autor kahanevalt
ilmumisaasta kasvavalt
ilmumisaasta kahanevalt
nimi kasvavalt
nimi kahanevalt
pealkiri kasvavalt
pealkiri kahanevalt
1
A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks
Farar, Alexandria Elaine
;
Bahsi, Hayretdin
;
Blumbergs, Bernhards
2017 International Conference On Cyber Incident Response, Coordination, Containment and Control, Cyber Incident 2017 : London, United Kingdom, 19 June 2017 through 20 June 2017
2017
/
[7] p. : ill
https://doi.org/10.1109/CYBERINCIDENT.2017.8054640
artikkel kogumikus
2
A live virtual simulator for teaching cybersecurity to information technology students
Ernits, Margus
;
Kikkas, Kaido
Learning and Collaboration Technologies : Third International Conference, LCT 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 : proceedings
2016
/
p. 474-486 : ill
http://dx.doi.org/10.1007/978-3-319-39483-1_43
artikkel kogumikus
3
A method for teaching Open Source Intelligence (OSINT) using personalised cloud-based exercises
Yari, Saber
;
Mäses, Sten
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 480−489
https://doi.org/10.34190/ICCWS.20.091
artikkel kogumikus
4
Accessing extraterritorially located data : options for states [Online resource]
Osula, Anna-Maria
2015
https://ccdcoe.org/sites/default/files/multimedia/pdf/Accessing%20extraterritorially%20located%20data%20options%20for%20States_Anna-Maria_Osula.pdf
raamat
5
Algas ründetegevusele suunatud küberoperatsioonide õppus [Võrguväljaanne]
postimees.ee
2021
"Algas ründetegevusele suunatud küberoperatsioonide õppus "
artikkel ajalehes
6
Alliance attribution of global cyber attacks : The European Union
Alatalu, Siim
National cyber emergencies: the return to civil defence
2020
/
p. 171−185
https://doi.org/10.4324/9780429343438
artikkel kogumikus
7
Analysis of national cyber situational awareness practices
Bahsi, Hayretdin
Strategic cyber defense : a multidisciplinary perspective
2017
/
p. 31-41
http://doi.org/10.3233/978-1-61499-771-9-31
artikkel kogumikus
8
Assessing the role of international relations in cybersecurity : a preliminary analysis
Rincon Mendez, Angelica Marina
CeDEM 15 : Proceedings of the International Conference for E-Democracy and Open Government 2015 : 20-22 May 2015, Danube University Krems, Austria
2015
/
p. 401-404
http://www.donau-uni.ac.at/imperia/md/content/department/gpa/zeg/bilder/cedem/cedem15/cedem15_oa_proceedings.pdf
artikkel kogumikus
9
Career development in cyber security: Bootcamp training programs
Caliskan, Emin
;
Vaarandi, Risto
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 503-511
https://doi.org/10.34190/ICCWS.20.080
artikkel kogumikus
10
Challenges in collecting digital evidence : a legal perspective
Kasper, Agnes
;
Laurits, Eneli
The future of law and eTechnologies
2016
/
p. 195-233 : ill
http://dx.doi.org/10.1007/978-3-319-26896-5_10
artikkel kogumikus
11
Cyber attacks on protective relays in digital substations and impact analysis
Rajkumar, Vetrivel Subramaniam
;
Tealane, Marko
;
Stefanov, Alexandru
;
Palensky, Peter
8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems(MSCPES), Virtual Workshop, online, from April 21, 2020 : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/MSCPES49613.2020.9133698
artikkel kogumikus
12
Cyber commands - a universal solution to a universal cyber security challenge?
Alatalu, Siim
Redesigning organizations
2020
/
p. 27−43
https://doi.org/10.1007/978-3-030-27957-8_2
artikkel kogumikus
13
Cyber commands - universal solution to a universal cyber security problem?
Alatalu, Siim
Proceedings of the 4th Interdisciplinary Cyber Research Workshop 2018 : 9th of June 2018
2018
/
p. 21-22
https://www.ttu.ee/public/k/kyberkriminalistika_ja_kyberjulgeoleku_keskus/CRW_2018_lingitud.pdf
artikkel kogumikus
14
Cybersecurity knowledge requirements for strategic level decision makers
Garcia-Granados, F.
;
Bahsi, Hayretdin
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 559-568
https://doi.org/
artikkel kogumikus
15
Design and implementation of an availability scoring system for cyber defence exercises
Pihelgas, Mauno
14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : Proceedings
2019
/
p. 329-337
http://toc.proceedings.com/48113webtoc.pdf
"ICCWS 2019"
artikkel kogumikus
16
Developing military cyber workforce in a conscript armed forces: recruitment, challenges and options
Sõmer, Tiia
;
Lorenz, Birgy
;
Ottis, Rain
14th International Conference on Cyber Warfare and Security (ICCWS 2019) : Stellenbosch University, South Africa, 28 February - 1 March 2019 : proceedings
2019
/
p. 413−421
http://toc.proceedings.com/48113webtoc.pdf
"ICCWS 2019"
artikkel kogumikus
17
Estonian scientists create a drone solution to help victims of terrorist attacks [Online resource]
Hankewitz, Sten
estonianworld.com
2021
"Estonian scientists create a drone solution to help victims of terrorist attacks"
artikkel ajalehes
18
EU cybersecurity governance – stakeholders and normative intentions towards integration
Kasper, Agnes
The future of the European Union : demisting the debate
2020
/
p. 166−185
https://www.um.edu.mt/library/oar/handle/123456789/52308
https://www.um.edu.mt/library/oar/bitstream/123456789/52308/1/EU_cybersecurity_governance%e2%80%93stakeholders_and_normative_intentions_towards_integration_2020.pdf
artikkel kogumikus
19
Expert knowledge elicitation for skill level categorization of attack paths
Mezešova, Terezia
;
Bahsi, Hayretdin
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
2019
/
8 p. : tab
https://doi.org/10.1109/CyberSecPODS.2019.8885192
artikkel kogumikus
20
Expert knowledge elicitation for skill level categorization of attack paths
Mezešova, Terezia
;
Bahsi, Hayretdin
Cyber science 2018 : conference programme
2018
/
p. 29
https://www.c-mric.com/wp-content/uploads/2018/04/20180611-Cyber-Science-2018-Event-Brochure-DRAFT-v0.6.pdf
artikkel kogumikus
21
From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises
Ernits, Margus
;
Mäses, Sten
;
Lepik, Toomas
;
Maennel, Olaf Manuel
Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS) : Old Dominion University (ODU), Norfolk, Virginia, USA, 12-13 March 2020
2020
/
p. 135-143
https://doi.org/10.34190/ICCWS.20.046
artikkel kogumikus
22
From text mining to evidence team learning in cybersecurity exercises
Maennel, Kaie
;
Joonsoo, Kim
;
Sütterlin, Stefan
Companion Proceedings of the 10th International Conference on Learning Analytics & Knowledge (LAK20) : Cyberspace, March 23-27, 2020
2020
/
p. 107-109
https://lak20.solaresearch.org
artikkel kogumikus
23
Improving and measuring learning effectiveness at cyber defense exercises
Maennel, Kaie
;
Ottis, Rain
;
Maennel, Olaf Manuel
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017 : proceedings
2017
/
p. 123-138 : ill
https://doi.org/10.1007/978-3-319-70290-2_8
artikkel kogumikus
24
Insider threat detection study [Online resource]
Kont, Markus
;
Pihelgas, Mauno
;
Wojtkowiak, Jesse
;
Trinberg, Lorena
;
Osula, Anna-Maria
2015
https://ccdcoe.org/sites/default/files/multimedia/pdf/Insider_Threat_Study_CCDCOE.pdf
raamat
25
International cyber norms : legal, policy & industry perspectives
2016
http://www.ester.ee/record=b4543144*est
https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf
raamat
Kirjeid leitud 61, kuvan
1 - 25
eelmine
1
2
3
järgmine
pealkiri
10
1.
Küberkaitse [Võrguteavik]
2.
Küberkaitse komisjon
3.
Küberkaitse suvekool Eesti Mereakadeemias
4.
Küberkaitse tipptegijad õpivad Eestis digitaalset ühiskonda turvama : [intervjuu TTÜ professori Olaf Maenelliga]
5.
Küberkaitse õpetamine jõuab maailmatasemele : [vastava õppekava arendamisest TTÜs]
6.
Nõukogud, komisjonid : ... Energeetikanõukogu, ... Mereteaduste komisjon, ... Eesti Teaduse Tippkeskuste nõukogu, Küberkaitse komisjon [jt.]
7.
Pronksiöö tõi küberkaitse õppekava : [magistritaseme õppes TÜ ja TTÜ koostöös]
8.
Teadlased loovad küberrünnakute tõrjumiseks Eesti interneti mudeli. TTÜ-s valmib spetsiaalne Eesti küberkaitse tarkvara
9.
TTÜ ja TÜ valmistavad koos ette küberkaitse, tarkvaratehnika ning energeetika spetsialiste
10.
Tulemas küberkaitse magistriõpe : [2007/2008. a. kevadsemestrist avatakse ülikoolidevaheline küberturbe õppemoodul : lühisõnum]
märksõna
2
1.
Kaitseliidu küberkaitse üksus
2.
küberkaitse